CN106355112A - Method of destructing data in encrypted mobile storage device and server - Google Patents
Method of destructing data in encrypted mobile storage device and server Download PDFInfo
- Publication number
- CN106355112A CN106355112A CN201610762135.0A CN201610762135A CN106355112A CN 106355112 A CN106355112 A CN 106355112A CN 201610762135 A CN201610762135 A CN 201610762135A CN 106355112 A CN106355112 A CN 106355112A
- Authority
- CN
- China
- Prior art keywords
- mobile storage
- storage apparatus
- destroyed
- data
- enciphered mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention is applicable to the technical field of communications and provides a method of destructing data in an encrypted mobile storage device and a server, wherein the method comprises: receiving a data destruction request, wherein the data destruction request includes an identifier of an encrypted mobile storage device to be destructed, and the encrypted mobile storage device to be destructed corresponding to the identifier of the encrypted mobile storage device to be destructed; detecting whether the encrypted mobile storage device to be destructed is activated or not; if yes, transmitting the data destruction command to the encrypted mobile storage device to be destructed in order to destruct the data stored in the encrypted mobile storage device to be destructed. It can be seen that it is possible to decrease the chances for the data in the encrypted mobile storage device to leak by implementing the embodiment of the invention.
Description
Technical field
The invention belongs to communication technical field, data destruction method and clothes in more particularly, to a kind of enciphered mobile storage apparatus
Business device.
Background technology
Movable storage device such as usb flash disk (usb flash disk, u disk) can facilitate storage and the realization of data
The mutual biography of data between different terminal equipment.In order to avoid the leakage of data in u disk in data during mutually passing, at present on the market
The movable storage device of encryption, such as recognition of face authenticated encryption u disk occur.Use recognition of face authenticated encryption u disk in user,
Realized to recognition of face certification by the face characteristic information collecting is identified comparison by built-in encryption system
The deciphering of encryption u disk, so that read the encryption data of recognition of face authenticated encryption u disk storage.
But, find in practice, when encryption u disk is accidentally lost, the encryption system in encryption u disk may be by lawless person
Break through, the probability that the encryption data of encryption u disk storage is revealed is higher.
Content of the invention
The embodiment of the present invention provides data destruction method and server in a kind of enciphered mobile storage apparatus, can reduce and add
The leakage probability of data in close movable storage device.
Embodiment of the present invention first aspect discloses data destruction method in a kind of enciphered mobile storage apparatus, methods described
Including:
Receive and destroy request of data, wherein said destruction request of data includes enciphered mobile storage apparatus mark to be destroyed,
And the described enciphered mobile storage apparatus to be destroyed of inquiry identify corresponding enciphered mobile storage apparatus to be destroyed;
Detect whether described enciphered mobile storage apparatus to be destroyed have been turned on;
If described enciphered mobile storage apparatus to be destroyed is detected to have been turned on, moving storage to described encryption to be destroyed and setting
Preparation is sent and is destroyed data command to destroy the data of storage in described enciphered mobile storage apparatus to be destroyed.
Embodiment of the present invention second aspect discloses a kind of device management server, and described device management server includes:
Receiving unit, destroys request of data for receiving, and wherein said destruction request of data includes encryption to be destroyed and moves
Storage device identification;
Equipment query unit, for inquiring about the enciphered mobile storage apparatus mark described to be destroyed that described receiving unit receives
Corresponding enciphered mobile storage apparatus to be destroyed;
Equipment starts detector unit, deposits for detecting that the encryption described to be destroyed that described equipment query unit inquires is moved
Whether storage equipment has been turned on;
Destroy data command transmitting element, move if starting detector unit for described equipment and described encryption to be destroyed is detected
Dynamic storage device has been turned on, then send to described enciphered mobile storage apparatus to be destroyed and destroy data command to treat pin described in destroying
Ruin the data of storage in enciphered mobile storage apparatus.
In the embodiment of the present invention, device management server receive destroy request of data after, if detect this to be destroyed plus
Close movable storage device has been turned on, then send destruction data command to this enciphered mobile storage apparatus to be destroyed and treat pin to destroy this
Ruin the data of storage in enciphered mobile storage apparatus.It can be seen that, implement the embodiment of the present invention, when enciphered mobile storage apparatus are lost accidentally
When losing and being used, device management server can send destruction request of data to this enciphered mobile storage apparatus and be added with destroying this
The data of storage in close movable storage device, thus reduce the probability that in this enciphered mobile storage apparatus, data storage is revealed.
Brief description
Fig. 1 is that the flow process of data destruction method in a kind of enciphered mobile storage apparatus provided in an embodiment of the present invention is illustrated
Figure;
Fig. 1 (a) is a kind of operation interface schematic diagram of individual's online management platform provided in an embodiment of the present invention;
Fig. 1 (b) is a kind of register interface schematic diagram of individual's online management platform provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of device management server provided in an embodiment of the present invention;
Fig. 3 is a kind of above-mentioned application interface changing method of operation provided in an embodiment of the present invention based on von Neumann system
Computer system.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and
It is not used in the restriction present invention.
It should be noted that the term using in embodiments of the present invention is the mesh only merely for description specific embodiment
, and it is not intended to be limiting the present invention." one of singulative used in the embodiment of the present invention and appended claims
Kind ", " described " and " being somebody's turn to do " are also intended to including most forms, unless context clearly shows that other implications.It is also understood that this
Used in literary composition, term "and/or" refers to and comprises one or more associated any or all possible group listing project
Close.
The embodiment of the present invention can apply to the device management server of managing encrypted movable storage device, when adding of user
After close movable storage device such as encrypts u disk loss, user can be on the device management server platform of management this encryption u disk
Carry out destroying the operation of data storage in this encryption u disk, once this device management server detects this encryption u disk being used,
This device management server can send destruction data command to this encryption u disk immediately and is stored in this encryption u disk with destroying
Data.
The embodiment of the invention discloses data destruction method and server in a kind of enciphered mobile storage apparatus, can reduce
The leakage probability of data in enciphered mobile storage apparatus.It is described in detail individually below.
Refer to Fig. 1, Fig. 1 is data destruction method in a kind of enciphered mobile storage apparatus disclosed in the embodiment of the present invention
Schematic flow sheet.As shown in figure 1, data destruction method may comprise steps of in this enciphered mobile storage apparatus.
S101, device management server receive destroys request of data, and wherein this destruction request of data includes encryption to be destroyed
Movable storage device identifies, and inquires about the mobile storage of the corresponding encryption to be destroyed of this enciphered mobile storage apparatus to be destroyed mark
Equipment.
Server can refer to, with higher computational power, storage capacity, can be supplied to multiple users by network and use
Computer, wherein this device management server can refer to the server for managing this enciphered mobile storage apparatus.Specifically,
One such as personal online management of platform managing this enciphered mobile storage apparatus can be arranged by this device management server
Platform etc., such as shown in Fig. 1 (a), this personal online management platform can taken with this equipment control similar to an operation interface
Client such as personal computer (personal computer, pc) client or smart mobile phone client that business device network is connected
Shown on end etc.;One or more enciphered mobile storage apparatus can be bound under this personal online management platform, such as,
Under personal online management platform shown in Fig. 1 (a), binding has enciphered mobile storage apparatus 1, enciphered mobile storage apparatus 2, adds
Close movable storage device 3 and enciphered mobile storage apparatus 4, when some in the plurality of enciphered mobile storage apparatus or multiple plus
When close movable storage device is lost, user can choose loss on this personal online management platform or user wants to destroy it
This enciphered mobile storage apparatus of storage inside data simultaneously click on the enciphered mobile storage apparatus that this chooses destruction data below
Button (as shown in Fig. 1 (a)) to send this destruction request of data to this device management server, then this device management server
Receive this destruction request of data of this client transmission.Wherein this destruction request of data can be used to ask to destroy the encryption lost
The data of storage in movable storage device.Wherein, the mobile storage of this encryption that should be selected on personal online management platform sets
Standby can be used as this enciphered mobile storage apparatus to be destroyed.Such as, in bound enciphered mobile storage apparatus in Fig. 1 (a),
Selected enciphered mobile storage apparatus are enciphered mobile storage apparatus 1, then this enciphered mobile storage apparatus 1 can be treated as this
Destroy enciphered mobile storage apparatus.
It should be noted that this enciphered mobile storage apparatus to be destroyed can be one or more, the embodiment of the present invention is not
It is construed as limiting.
In addition, this destruction request of data that this pc or smart mobile phone client pass through this personal online management platform transmission can
To include this enciphered mobile storage apparatus mark to be destroyed, this device management server can be deposited according to this encryption movement to be destroyed
Storage device identification inquires this enciphered mobile storage apparatus to be destroyed and identifies this enciphered mobile storage apparatus to be destroyed corresponding, its
In this enciphered mobile storage apparatus to be destroyed mark can be combined with any one or more of numeral, letter or Chinese character.Than
As, this enciphered mobile storage apparatus to be destroyed mark can " enciphered mobile storage apparatus 1 " as shown in Fig. 1 (a), " encryption moves
Dynamic storage device identification 2 " or " enciphered mobile storage apparatus 3 " etc..
Wherein, movable storage device can include u disk, portable hard drive, safe digital card (secure digital
Memory card/sd card, sd card), micro sd card (English: micro sd card) etc..The mobile storage of this encryption
Equipment can be the movable storage device being encrypted by recognition of face certification and is encrypted by fingerprint recognition certification
Movable storage device etc..Wherein can refer to enter using face characteristic information by the enciphered mobile storage apparatus of recognition of face certification
Row encryption, when user is when using this recognition of face authenticated encryption movable storage device, can be by this recognition of face authenticated encryption
Movable storage device is inserted in bat by interface such as USB (universal serial bus, usb)
According on such as pc in the terminal of function, the facial feature information of user is shot come to this recognition of face certification by the photographic head of pc
Enciphered mobile storage apparatus are decrypted, if the facial feature information of user shooting is deposited with the movement of this recognition of face authenticated encryption
The information matches degree of the face characteristic information gathering during the encryption of storage equipment, then can be right within default matching degree threshold range
This recognition of face authenticated encryption movable storage device successful decryption adds so that this recognition of face certification can be read on this pc
The data of storage in close movable storage device, conversely, then cannot read in this recognition of face authenticated encryption movable storage device
Data of storage etc..In addition, the operating process when reading data for the enciphered mobile storage apparatus of this fingerprint recognition certification is same should
Recognition of face authenticated encryption movable storage device is similar to, and will not be described here.
S102, this device management server detect whether this enciphered mobile storage apparatus to be destroyed has been turned on;If detecting
This enciphered mobile storage apparatus to be destroyed has been turned on, then execution step s103, on the contrary then process ends.
It should be noted that whether this enciphered mobile storage apparatus to be destroyed has been turned on referring to this encryption movement to be destroyed
Whether storage device is activated so that the data of this enciphered mobile storage apparatus to be destroyed storage will be read, if this to be destroyed plus
Close movable storage device is activated so that the data of this enciphered mobile storage apparatus storage to be destroyed will be read, then may indicate that
This enciphered mobile storage apparatus to be destroyed has been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated;
Or, if this enciphered mobile storage apparatus to be destroyed carrys out data storage using zoning, data encryption area data can be divided into
Open area, wherein this data encryption area are used for storing that user is not desired to external disclosure, belongs to individual subscriber privacy and needs are protected
Close data, the open area of this data can store user and the public can be carried out with disclosure, shared data, then this encryption to be destroyed
Whether movable storage device has been turned on referring to whether this enciphered mobile storage apparatus to be destroyed is activated so that this will be read
The data of the data encryption area storage of enciphered mobile storage apparatus to be destroyed, if this enciphered mobile storage apparatus to be destroyed is activated
So that the data of the data encryption area storage of this enciphered mobile storage apparatus to be destroyed will be read, then may indicate that this is to be destroyed
Enciphered mobile storage apparatus have been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated etc..
In this enciphered mobile storage apparatus to be destroyed in the number that will read this enciphered mobile storage apparatus storage to be destroyed
According to certain section of default program can be first carried out before, if this device management server detects this certain section default program and holds
OK, then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on;Or, this to be destroyed plus
Close movable storage device can before the data of data encryption area storage in will reading this enciphered mobile storage apparatus to be destroyed
To first carry out another section of default program, if this device management server detects this another section of default program and is carrying out,
Then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on.
In practice, such as u disk in the usb socket inserting computer but also can not read the number of this u disk memory storage on computers
According to when can eject the dialog box installing * * application program, this * * program can refer to above-mentioned certain section of described default program or
Another section of default program, computer can be by the content uploading of this dialog box to this device management server, thus this equipment control
Server can detect that this u disk has been turned on.
This enciphered mobile storage apparatus to be destroyed of s103, this device management server send destroys data command to destroy this
The data of storage in enciphered mobile storage apparatus to be destroyed.
It should be noted that this destruction data command can destroy whole numbers of storage in this enciphered mobile storage apparatus
According to;Or only destroy this enciphered mobile storage apparatus data encryption area storage belong to the individual privacy of user and user is reluctant public affairs
Data opened etc., the embodiment of the present invention is not construed as limiting.
Optionally, before this device management server receives and destroys request of data, this device management server is acceptable
Receive personal online management Account Registration information, this personal online management Account Registration information includes login account name and registration account
Family password;According to this login account name and this login account identification number register individual's online management account;And receive encryption movement
Enciphered mobile storage apparatus are somebody's turn to do with registered by storage device bind request according to this enciphered mobile storage apparatus bind request
Personal online management account is bound, and wherein this personal online management account is used for managing the binding of this people's online management account
This enciphered mobile storage apparatus.
User can grasp in this personal online management as shown in the client such as pc or smart mobile phone shown in Fig. 1 (b)
Make to insert individual's online management Account Registration information such as login account name and login account password on interface to be registered, this pc
Or this personal online management Account Registration information that user inserts can be sent to this equipment control by the client such as smart mobile phone
Server, this device management server receives this personal online management Account Registration information and is registered, after succeeding in registration, user
Can pass through this login account name and this personal online management account operation interface of login account password login, and after login
Select on this personal online management account operation interface to need this enciphered mobile storage apparatus of binding, and pass through this pc or intelligence
Mobile phone sends enciphered mobile storage apparatus bind request to ask individual in this login in spool to this device management server
Bind, under reason account, this enciphered mobile storage apparatus selecting to need binding;This device management server receives encryption movement and deposits
Storage apparatus bound request, and select this to need this encryption of binding to move according to this enciphered mobile storage apparatus bind request
Storage device is bound with this personal online management account registered.Finally, this device management server is online in this people
Inquire about this in this enciphered mobile storage apparatus of account executive binding enciphered mobile storage apparatus to be destroyed mark is corresponding and treat pin
Ruin enciphered mobile storage apparatus
For example, if the entitled abc of this login account, this login account password is 123, and user passes through this login account name
After being the personal online management account successes of 123 registrations for abc with this login account password, it is entitled that user passes through this login account
Abc and this login account password are 123 this personal online management account of login, and this personal online management account after login
Select to need this enciphered mobile storage apparatus such as enciphered mobile storage apparatus 1 of binding and enciphered mobile storage apparatus 2 to carry out
Binding etc..
Optionally, this device management server can be with the biological information of typing user, if this biological information
Typing is passed through then to execute this reception individual's online management Account Registration information operation.
This device management server can by being connected with this device management server network, there is photographic head or fingerprint
The biological information of the terminal typing user of identifier.Wherein, this biological information can be face characteristic information, fingerprint
Characteristic information or pupil feature information etc..If than device management server typing be user face characteristic information, then examine
Gauge head is sent out and whether is covered the hair of eyes or ear side and the checking information such as whether have been placed in after ear, if this is tested
Card information is passed through then this biological information typing and is passed through, and in addition the biological information of this typing can also be real in the present invention
Apply the enciphered mobile storage apparatus that example is related to be bound, as the Crypted password etc. of this enciphered mobile storage apparatus.
In method described by Fig. 1, device management server receives after destroying request of data, if detecting this to treat pin
Ruin enciphered mobile storage apparatus to have been turned on, then send to this enciphered mobile storage apparatus to be destroyed and destroy data command to destroy this
The data of storage in enciphered mobile storage apparatus to be destroyed.It can be seen that, the method implementing Fig. 1 description, work as enciphered mobile storage apparatus
When being accidentally lost and being used, device management server can send to this enciphered mobile storage apparatus and destroy request of data with pin
Ruin in this enciphered mobile storage apparatus the data of storage, thus lower that data storage in this enciphered mobile storage apparatus reveals is general
Rate.
Refer to Fig. 2, Fig. 2 is a kind of structural representation of device management server disclosed in the embodiment of the present invention.Wherein,
Device management server shown in Fig. 2 may include that
Receiving unit 201, destroys request of data for receiving, and wherein this destruction request of data includes encryption movement to be destroyed
Storage device identification.
Equipment query unit 202, for inquiring about this enciphered mobile storage apparatus mark to be destroyed of this receiving unit 201 reception
Know corresponding enciphered mobile storage apparatus to be destroyed.
Server can refer to, with higher computational power, storage capacity, can be supplied to multiple users by network and use
Computer, wherein this device management server can refer to the server for managing this enciphered mobile storage apparatus.Specifically,
One such as personal online management of platform managing this enciphered mobile storage apparatus can be arranged by this device management server
Platform etc., such as shown in Fig. 1 (a), this personal online management platform can taken with this equipment control similar to an operation interface
Client such as personal computer (personal computer, pc) client or smart mobile phone client that business device network is connected
Shown on end etc.;One or more enciphered mobile storage apparatus can be bound under this personal online management platform, such as,
Under personal online management platform shown in Fig. 1 (a), binding has enciphered mobile storage apparatus 1, enciphered mobile storage apparatus 2, adds
Close movable storage device 3 and enciphered mobile storage apparatus 4, when some in the plurality of enciphered mobile storage apparatus or multiple plus
When close movable storage device is lost, user can choose loss on this personal online management platform or user wants to destroy it
This enciphered mobile storage apparatus of storage inside data simultaneously click on the enciphered mobile storage apparatus that this chooses destruction data below
Button (as shown in Fig. 1 (a)) to send this destruction request of data to this device management server, then this device management server
Receive this destruction request of data of this client transmission.Wherein this destruction request of data can be used to ask to destroy the encryption lost
The data of storage in movable storage device.Wherein, the mobile storage of this encryption that should be selected on personal online management platform sets
Standby can be used as this enciphered mobile storage apparatus to be destroyed.Such as, in bound enciphered mobile storage apparatus in Fig. 1 (a),
Selected enciphered mobile storage apparatus are enciphered mobile storage apparatus 1, then this enciphered mobile storage apparatus 1 can be treated as this
Destroy enciphered mobile storage apparatus.
It should be noted that this enciphered mobile storage apparatus to be destroyed can be one or more, the embodiment of the present invention is not
It is construed as limiting.
In addition, this destruction request of data that this pc or smart mobile phone client pass through this personal online management platform transmission can
To include this enciphered mobile storage apparatus mark to be destroyed, this device management server can be deposited according to this encryption movement to be destroyed
Storage device identification inquires this enciphered mobile storage apparatus to be destroyed and identifies this enciphered mobile storage apparatus to be destroyed corresponding, its
In this enciphered mobile storage apparatus to be destroyed mark can be combined with any one or more of numeral, letter or Chinese character.Than
As, this enciphered mobile storage apparatus to be destroyed mark can " enciphered mobile storage apparatus 1 " as shown in Fig. 1 (a), " encryption moves
Dynamic storage device identification 2 " or " enciphered mobile storage apparatus 3 " etc..
Equipment starts detector unit 203, for detecting this encryption movement to be destroyed that this equipment query unit 202 inquires
Whether storage device has been turned on.
It should be noted that whether this enciphered mobile storage apparatus to be destroyed has been turned on referring to this encryption movement to be destroyed
Whether storage device is activated so that the data of this enciphered mobile storage apparatus to be destroyed storage will be read, if this to be destroyed plus
Close movable storage device is activated so that the data of this enciphered mobile storage apparatus storage to be destroyed will be read, then may indicate that
This enciphered mobile storage apparatus to be destroyed has been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated;
Or, if this enciphered mobile storage apparatus to be destroyed carrys out data storage using zoning, data encryption area data can be divided into
Open area, wherein this data encryption area are used for storing that user is not desired to external disclosure, belongs to individual subscriber privacy and needs are protected
Close data, the open area of this data can store user and the public can be carried out with disclosure, shared data, then this encryption to be destroyed
Whether movable storage device has been turned on referring to whether this enciphered mobile storage apparatus to be destroyed is activated so that this will be read
The data of the data encryption area storage of enciphered mobile storage apparatus to be destroyed, if this enciphered mobile storage apparatus to be destroyed is activated
So that the data of the data encryption area storage of this enciphered mobile storage apparatus to be destroyed will be read, then may indicate that this is to be destroyed
Enciphered mobile storage apparatus have been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated etc..
In this enciphered mobile storage apparatus to be destroyed in the number that will read this enciphered mobile storage apparatus storage to be destroyed
According to certain section of default program can be first carried out before, if this device management server detects this certain section default program and holds
OK, then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on;Or, this to be destroyed plus
Close movable storage device can before the data of data encryption area storage in will reading this enciphered mobile storage apparatus to be destroyed
To first carry out another section of default program, if this device management server detects this another section of default program and is carrying out,
Then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on.
Destroy data command transmitting element 204, if starting detector unit 203 for this equipment this encryption to be destroyed is detected
Movable storage device has been turned on, then send destruction data command to this enciphered mobile storage apparatus to be destroyed to be destroyed to destroy this
The data of storage in enciphered mobile storage apparatus.
It should be noted that this destruction data command can destroy whole numbers of storage in this enciphered mobile storage apparatus
According to;Or only destroy this enciphered mobile storage apparatus data encryption area storage belong to the individual privacy of user and user is reluctant public affairs
Data opened etc., the embodiment of the present invention is not construed as limiting.
Optionally, in this enciphered mobile storage apparatus to be destroyed, the data of storage includes encryption data.This destruction data refers to
Make transmitting element 204, treat pin specifically for sending destruction data command to this enciphered mobile storage apparatus to be destroyed to destroy this
Ruin the encryption data of storage in enciphered mobile storage apparatus.
Optionally, this receiving unit 201, is additionally operable to, before receiving this destruction request of data, receive personal online management
Account Registration information, this personal online management Account Registration information includes login account name and login account password.
This device management server, also includes:
Account Registration unit 205, this login account name and this login account for being received according to this receiving unit 201 are close
The personal online management account of code registration.
This receiving unit 201, is additionally operable to receive enciphered mobile storage apparatus bind request.
Apparatus bound unit 206, for this enciphered mobile storage apparatus bind request being received according to this receiving unit 201
Enciphered mobile storage apparatus are bound with this personal online management account registered, wherein this personal online management account
For managing this enciphered mobile storage apparatus of this people's online management account binding.
This equipment query unit 202, specifically for bind in this people's online management account in this apparatus bound unit 206
Inquire about this enciphered mobile storage apparatus to be destroyed in this enciphered mobile storage apparatus and identify the mobile storage of corresponding encryption to be destroyed
Equipment.
User can grasp in this personal online management as shown in the client such as pc or smart mobile phone shown in Fig. 1 (b)
Make to insert individual's online management Account Registration information such as login account name and login account password on interface to be registered, this pc
Or this personal online management Account Registration information that user inserts can be sent to this equipment control by the client such as smart mobile phone
Server, this device management server receives this personal online management Account Registration information and is registered, after succeeding in registration, user
Can pass through this login account name and this personal online management account operation interface of login account password login, and after login
Select on this personal online management account operation interface to need this enciphered mobile storage apparatus of binding, and pass through this pc or intelligence
Mobile phone sends enciphered mobile storage apparatus bind request to ask individual in this login in spool to this device management server
Bind, under reason account, this enciphered mobile storage apparatus selecting to need binding;This device management server receives encryption movement and deposits
Storage apparatus bound request, and select this to need this encryption of binding to move according to this enciphered mobile storage apparatus bind request
Storage device is bound with this personal online management account registered.Finally, this device management server is online in this people
Inquire about this in this enciphered mobile storage apparatus of account executive binding enciphered mobile storage apparatus to be destroyed mark is corresponding and treat pin
Ruin enciphered mobile storage apparatus
Optionally, this receiving unit 201, is additionally operable to receive the biological information of the user of typing, if this biological characteristic
Data Enter passes through then to execute this reception individual's online management Account Registration information operation.
This device management server can by being connected with this device management server network, there is photographic head or fingerprint
The biological information of the terminal typing user of identifier.Wherein, this biological information can be face characteristic information, fingerprint
Characteristic information or pupil feature information etc..If than device management server typing be user face characteristic information, then examine
Gauge head is sent out and whether is covered the hair of eyes or ear side and the checking information such as whether have been placed in after ear, if this is tested
Card information is passed through then this biological information typing and is passed through, and in addition the biological information of this typing can also be real in the present invention
Apply the enciphered mobile storage apparatus that example is related to be bound, as the Crypted password etc. of this enciphered mobile storage apparatus.
Optionally, described enciphered mobile storage apparatus include recognition of face authenticated encryption movable storage device and fingerprint recognition
Authenticated encryption movable storage device.
It can be seen that, implement the device management server of Fig. 2 description, when enciphered mobile storage apparatus are accidentally lost and are used
When, device management server can send to this enciphered mobile storage apparatus destroys request of data to destroy the mobile storage of this encryption
The data of storage in equipment, thus reduce the probability that in this enciphered mobile storage apparatus, data storage is revealed.
Fig. 3 illustrates a kind of computer system 3 based on von Neumann system running above-mentioned application interface changing method.
This computer system 3 can be smart mobile phone, panel computer, palm PC, the user terminal such as notebook computer or PC
Equipment.Specifically, it may include the outer input interface 1001 that connected by system bus, processor 1002, memorizer 1003 and
Output interface 1004.Wherein, outer input interface 1001 may include touch screen 10016, optionally can also include network interface
10018.Memorizer 1003 may include external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage 10034.Defeated
Outgoing interface 1004 may include the equipment such as display screen 10042 and sound equipment/loudspeaker 10044.
In the present embodiment, the operation of this method is based on computer program, and the program file of this computer program is stored in
In the aforementioned external memory 10032 based on the computer system 10 of von Neumann system, operationally it is loaded into built-in storage
In 10034, after being then compiled as machine code, it is transferred to execution in processor 1002, so that being based on von Neumann system
Computer system 10 in formed operation in logic monitor module 310, finger print detecting module 320, changing interface module 330,
Pressure value judge module 340, the first step-length determining module 350 and the second step-length determining module 360, and cut in above-mentioned application interface
Change in method implementation procedure, the parameter of input is all received by outer input interface 1001, and be transferred in memorizer 1003 slow
Deposit, be then input to be processed in processor 1002, the result data of process or be cached in memorizer 1003 carries out follow-up
Ground is processed, or is passed to output interface 1004 and is exported.
Step in present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device management server can merge according to actual needs, divides and delete
Subtract.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.
Claims (10)
1. in a kind of enciphered mobile storage apparatus data destruction method it is characterised in that methods described includes:
Receive and destroy request of data, wherein said destruction request of data includes enciphered mobile storage apparatus mark to be destroyed, and
Inquire about described enciphered mobile storage apparatus to be destroyed and identify corresponding enciphered mobile storage apparatus to be destroyed;
Detect whether described enciphered mobile storage apparatus to be destroyed have been turned on;
If described enciphered mobile storage apparatus to be destroyed is detected to have been turned on, send out to described enciphered mobile storage apparatus to be destroyed
Send and destroy data command to destroy the data of storage in described enciphered mobile storage apparatus to be destroyed.
2. method according to claim 1 it is characterised in that in described enciphered mobile storage apparatus to be destroyed storage number
According to inclusion encryption data;
Described transmission to described enciphered mobile storage apparatus to be destroyed destroys data command to destroy described encryption movement to be destroyed
The data of storage in storage device, comprising:
Send to described enciphered mobile storage apparatus to be destroyed and destroy data command to destroy the mobile storage of described encryption to be destroyed
The encryption data of storage in equipment.
3. method according to claim 1 is it is characterised in that before described reception destruction request of data, methods described is also
Including:
Receive personal online management Account Registration information, described individual's online management Account Registration information include login account name and
Login account password;
According to described login account name and described login account identification number register individual's online management account;And receive encryption movement
Storage device bind request, according to described enciphered mobile storage apparatus bind request by enciphered mobile storage apparatus with registered
Described individual's online management account is bound;
The described enciphered mobile storage apparatus to be destroyed of described inquiry identify corresponding enciphered mobile storage apparatus to be destroyed, comprising:
Inquire about described encryption movement to be destroyed to deposit in the described enciphered mobile storage apparatus of described people's online management account binding
The storage corresponding enciphered mobile storage apparatus to be destroyed of device identification.
4. method according to claim 3 it is characterised in that described reception individual online management Account Registration information it
Before, methods described also includes:
The biological information of typing user, if described biological information typing is passed through, executes described reception individual in spool
Reason Account Registration information operation.
5. the method according to claim 3 or 4 is it is characterised in that described enciphered mobile storage apparatus include recognition of face
Authenticated encryption movable storage device and fingerprint recognition authenticated encryption movable storage device.
6. a kind of device management server is it is characterised in that described device management server includes:
Receiving unit, destroys request of data for receiving, and wherein said destruction request of data includes the mobile storage of encryption to be destroyed
Device identification;
Equipment query unit, corresponds to for inquiring about the enciphered mobile storage apparatus mark described to be destroyed that described receiving unit receives
Enciphered mobile storage apparatus to be destroyed;
Equipment starts detector unit, sets for detecting that storage is moved in the encryption described to be destroyed that described equipment query unit inquires
Standby whether have been turned on;
Destroy data command transmitting element, deposit if starting detector unit for described equipment and described encryption movement to be destroyed is detected
Storage equipment has been turned on, then send to described enciphered mobile storage apparatus to be destroyed destroy data command with destroy described to be destroyed plus
The data of storage in close movable storage device.
7. device management server according to claim 6 is it is characterised in that described enciphered mobile storage apparatus to be destroyed
The data of middle storage includes encryption data;
Described destruction data command transmitting element, destroys data specifically for sending to described enciphered mobile storage apparatus to be destroyed
Instruction is to destroy the encryption data of storage in described enciphered mobile storage apparatus to be destroyed.
8. device management server according to claim 6, it is characterised in that described receiving unit, is additionally operable to receiving
Before described destruction request of data, receive personal online management Account Registration information, described individual's online management Account Registration letter
Breath includes login account name and login account password;
Described device management server, also includes:
Account Registration unit, described login account name and described login account password for being received according to described receiving unit are noted
The personal online management account of volume;
Described receiving unit, is additionally operable to receive enciphered mobile storage apparatus bind request;
Apparatus bound unit, the described enciphered mobile storage apparatus bind request for being received according to described receiving unit will be encrypted
Movable storage device is bound with registered described individual's online management account;
Described equipment query unit, described in binding in described people's online management account in described apparatus bound unit
Inquire about the corresponding encryption to be destroyed of described enciphered mobile storage apparatus mark to be destroyed in enciphered mobile storage apparatus and move storage
Equipment.
9. device management server according to claim 8, it is characterised in that described receiving unit, is additionally operable to receive record
The biological information of the user entering, if described biological information typing is passed through, executes the personal online management account of described reception
Family log-on message operation.
10. device management server according to claim 8 or claim 9 is it is characterised in that described enciphered mobile storage apparatus bag
Include recognition of face authenticated encryption movable storage device and fingerprint recognition authenticated encryption movable storage device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610762135.0A CN106355112A (en) | 2016-08-30 | 2016-08-30 | Method of destructing data in encrypted mobile storage device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610762135.0A CN106355112A (en) | 2016-08-30 | 2016-08-30 | Method of destructing data in encrypted mobile storage device and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106355112A true CN106355112A (en) | 2017-01-25 |
Family
ID=57857615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610762135.0A Pending CN106355112A (en) | 2016-08-30 | 2016-08-30 | Method of destructing data in encrypted mobile storage device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106355112A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108376224A (en) * | 2018-02-24 | 2018-08-07 | 深圳市大迈科技有限公司 | A kind of movable storage device and its encryption method and device |
CN108875424A (en) * | 2017-05-10 | 2018-11-23 | 置富科技(深圳)股份有限公司 | It stores terminal and its destroys data processing method and device |
CN109831300A (en) * | 2017-11-23 | 2019-05-31 | 航天信息股份有限公司 | A kind of cipher key destruction method and device |
CN113568846A (en) * | 2021-07-29 | 2021-10-29 | 联想长风科技(北京)有限公司 | Method and device for destroying encrypted hard disk |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588371A (en) * | 2009-06-11 | 2009-11-25 | 王德高 | Method based on internet for protecting memory device |
CN101661441A (en) * | 2009-09-08 | 2010-03-03 | 王德高 | Protecting method for USB movable storage device based on internet |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
CN101882194A (en) * | 2009-05-04 | 2010-11-10 | 同方股份有限公司 | Mobile storage device with remote self-destruction function |
CN102568555A (en) * | 2012-01-31 | 2012-07-11 | 郑州信大捷安信息技术股份有限公司 | USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof |
CN102932762A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM) |
CN104796532A (en) * | 2015-03-13 | 2015-07-22 | 广东欧珀移动通信有限公司 | Method and device for destroying mobile terminal |
CN105592168A (en) * | 2009-05-01 | 2016-05-18 | 苹果公司 | Remotely locating and commanding a mobile device |
-
2016
- 2016-08-30 CN CN201610762135.0A patent/CN106355112A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105592168A (en) * | 2009-05-01 | 2016-05-18 | 苹果公司 | Remotely locating and commanding a mobile device |
CN101882194A (en) * | 2009-05-04 | 2010-11-10 | 同方股份有限公司 | Mobile storage device with remote self-destruction function |
CN101588371A (en) * | 2009-06-11 | 2009-11-25 | 王德高 | Method based on internet for protecting memory device |
CN101661441A (en) * | 2009-09-08 | 2010-03-03 | 王德高 | Protecting method for USB movable storage device based on internet |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
CN102568555A (en) * | 2012-01-31 | 2012-07-11 | 郑州信大捷安信息技术股份有限公司 | USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof |
CN102932762A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM) |
CN104796532A (en) * | 2015-03-13 | 2015-07-22 | 广东欧珀移动通信有限公司 | Method and device for destroying mobile terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108875424A (en) * | 2017-05-10 | 2018-11-23 | 置富科技(深圳)股份有限公司 | It stores terminal and its destroys data processing method and device |
CN109831300A (en) * | 2017-11-23 | 2019-05-31 | 航天信息股份有限公司 | A kind of cipher key destruction method and device |
CN108376224A (en) * | 2018-02-24 | 2018-08-07 | 深圳市大迈科技有限公司 | A kind of movable storage device and its encryption method and device |
CN113568846A (en) * | 2021-07-29 | 2021-10-29 | 联想长风科技(北京)有限公司 | Method and device for destroying encrypted hard disk |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706033B2 (en) | Secure distributed information system | |
CN105279449B (en) | Data access control method, system and mobile equipment based on context | |
US7797549B2 (en) | Secure method and system for biometric verification | |
CN105493054A (en) | Fast data protection using dual file systems | |
CN104657674A (en) | Isolation protection system and isolation protection method of private data in mobile phone | |
KR20080095866A (en) | Computer session management device and system | |
CN103366107A (en) | A method, device and mobile phone for protecting application program access rights | |
WO2007112023A2 (en) | Secure biometric processing system and method of use | |
WO2016192165A1 (en) | Data encryption method and apparatus | |
CN114730337A (en) | Cryptographic key management | |
CN112636914B (en) | Identity verification method, identity verification device and smart card | |
JP2008047085A (en) | Data security system, apparatus and method using usb device | |
CN104951704B (en) | A kind of image information collecting device and its encryption method | |
CN101140605A (en) | Data safe reading method and safe storage device thereof | |
CN106355112A (en) | Method of destructing data in encrypted mobile storage device and server | |
CN108322310A (en) | It is a kind of to utilize safety equipment Card Reader login method and Security Login System | |
CN111027077B (en) | Encryption method and device for storage equipment and storage medium | |
JP7105495B2 (en) | Segmented key authenticator | |
CN105208045B (en) | A kind of auth method, equipment and system | |
CN106650372A (en) | open method and device of administrator authority | |
CN110321731A (en) | A kind of information protecting method and mobile terminal | |
KR101221728B1 (en) | The certification process server and the method for graphic OTP certification | |
CN107743179A (en) | Information processing method, mobile terminal and operating system | |
CN111291429B (en) | Data protection method and system | |
CN103824029B (en) | Intelligent card data treating method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170125 |